PCI_Implementation_Guide
PCI_Implementation_Guide
For
PaymentDirector/FraudShield
Version 1.1
EFD—eFunds Corporation has made a number of application and procedural changes in order to
ensure that your PAYMENTDIRECTOR/FRAUDSHIELD software is compliant with these new
PABP requirements. Your use of a PABP-certified application simplifies some parts of your overall
PCI compliance effort. To however, EFD PAYMENTDIRECTOR/FRAUDSHIELD software
has been PABP (Payment Application Best Practices) certified, with specific EFD software
applications working in conjunction with an independent Visa U.S.A. approved auditing firm.
This document also outlines Visa’s Cardholder Information Security Program (CISP),
the Payment Card Industry (PCI) initiative and the Payment Application Best Practices
(PABP) guidelines. The document then provides specific instructions on how to utilize best
practices for using EFD software as a PABP Application operating in a PCI Compliant
environment.
For additional information or questions regarding the above applications, please contact your
eFunds account manager or use the contact information listed below:
■ Additional information for merchants from Visa is available at the following Internet address:
• www.atwcorp.com/pabp/authorizenet/CISP_PABP.pdf
• http://usa.visa.com/download/merchants/cisp_payment_application_best_prac
tices.doc
Please refer to Visa’s “Payment Applications Best Practices” document, as well as the associated
“Payment Card Industry Data Security Standard” document for full details on compliance
regulations.
EFD worked with the following Visa U.S.A. approved certification firm to obtain our PABP
Certification:
Ambiron TrustWave
120 N LaSalle Street
Suite 1250
Chicago, IL 60602
Phone: 312-873-7500
Fax: 312-443-8028
www.atwcorp.com
In summary, PABP is the standard against which EFD – eFunds Corporation has been tested and
certified. You are responsible for compliance with PCI based on your specific implementation of
this software, your software hosting environment, your data security policies, and so on by using
We have performed an audit and certification compliance review with our independent
auditing firm, to ensure that our platform/software does conform to current PABP standards when
handling, managing and storing payment related information.
Additionally, EFD offers PCI ready hosting plans, suitable for installing EFD software, if you need.
Other hosting providers may also offer PCI compliant hosting options.
We have tested and certified to the Visa U.S.A. “Payment Application Best Practices”
(PABP) standard, to ensure that when you load an EFD software product into an environment
equivalent to our recommended PCI ready environment that our application is also following best
practices. This will help you achieve PCI compliance easily with respect to how EFD handles user
accounts, passwords, encryption, and other payment data related information.
After installation and initial certification to PCI standards, you should then follow our
recommended operational guidelines (defined later in this document) to ensure continued
best practices for management of your storefront. Visa U.S.A. specifies different levels of
compliance requirements, driven mostly by the annual transaction volume of your storefront. You
should read the documentation provided by Visa (see above) to determine the level of PCI
Compliance required for your business.
The Payment Card Industry (PCI) Data Security Standard is a worldwide standard for
payment card and consumer financial data protection. It incorporates the requirements of
the Visa U.S.A. Cardholder Information Security Program (CISP) and the Visa
International Account Information Security (AIS) program, the MasterCard International
Site Data Protection (SDP) program, as well as the security requirements of American
Express DSS, DiscoverCard DISC and the Japan Credit Bureau (JCB).
The Payment Card Industry (PCI) has developed security standards for handling
cardholder information in a published standard called the PCI Data Security Standard
(DSS). The security requirements defined in the DSS apply to all members, merchants,
and service providers that store, process, or transmit cardholder data.
The PCI DSS requirements apply to all system components within the payment
application environment, which is defined as any network device, host, or application
included in, or connected to, a network segment where cardholder data is stored,
processed, or transmitted.
The following twelve high-level requirements comprise the core of the PCI DSS:
The remainder of this document describes the essential guidance for installing,
configuring, and managing EFD software in a PCI ready environment.
If the data encryption keys are stored in keyfiles, when the data encryption keys are invalid or not
used any longer, they need to be deleted securely.
According to PABP guidelines, using ‘rm’ command in UNIX to simply delete the file is not
considered a secure deletion.
EFD recommends using the following as an example:
■ For Unix use srm (secure delete)
By using srm (secure delete), this removes each specified file by overwriting, renaming and
truncating the file before unlinking. This prevents others from undeleting or recovering any
information about the file from the command line.
The PCI standard requires the following password complexity for compliance (often
referred to as using “strong passwords”):
PCI user-account requirements beyond uniqueness and password complexity are listed
below:
The above guidelines pertain to any accounts that are capable of either administering network
security (such as firewall administration), or accounts capable of directly accessing the data files
through a means other than the software application itself. More details as to administrative access
may be found in PCI Data Security Standard sections 7, 8 and 9, or PABP standards sections 3.1,
3.2, and 3.4.
EFD software, as tested to in our PABP audit, meets, or exceeds these requirements.
In the case of vendor remote access accounts, in addition to the standard access
controls, vendor accounts should only be active while access is required to provide
service. Access rights should include only the access rights required for the service
rendered, and should be robustly audited.
■ Firewall/port filtering services should be placed between wireless access points and the
payment application environment with rules restricting access. EFD recommends placing any
wireless router(s) on an Internet DMZ.
■ Use of appropriate encryption mechanisms such as VPN, SSL/TPS at 128 bit, WEP at 128 bit,
and/or WPA
■ If WEP is used, the following additional requirements must be met:
• Another encryption methodology must be used to protect cardholder data
• If automated WEP key rotation is implemented, key change should occur every
ten to thirty minutes
• If automated key change is not used, keys should be manually changed at least
quarterly and when key personnel leave the organization
• Vendor supplied defaults (administrator username/password, SSID, and SNMP
community values) should be changed
• Access points should restrict access to known authorized devices (using MAC
Address filtering)
■ Wireless router “SSID broadcasts” must be disabled.
■ Disable any SNMP broadcasts or anonymous query capabilities. If SNMP is desired, ensure
that sensitive SNMP information is not in the “public” domain, and any vendor default
passwords have been changed.
■ EFD recommends always enabling “WPA encryption” on all wireless devices used.
■ EFD recommends placing any wireless routers on a “DMZ” network, thus requiring wireless
traffic to “pass through” a separate firewall device before reaching the software Application
server. This may be accomplished by placing your wireless router between your DSL/Cable
modem router and Firewall devices.
Additionally, PCI requires that cardholder information never be sent via e-mail without
The PCI DSS requires that firewall services be used (with NAT or PAT) to segment
network segments into logical security domains based on the environmental needs for
Internet access. Traditionally, this corresponds to the creation of at least a DMZ and a
trusted network segment where only authorized, business-justified traffic from the DMZ
is allowed to connect to the trusted segment. No direct incoming Internet traffic to the
trusted application environment can be allowed. Additionally, outbound Internet access
from the trusted segment must be limited to required and justified ports and services.
The following is a very basic plan every merchant/service provider should adopt in
developing and implementing a security policy and program:
NOTE: We highly recommend contacting Ambiron TrustWare, the PABP auditing firm
which was use for EFD software.
The PCI standard requires that, if employees, administrators, or vendors are granted remote access
to the payment-processing environment, access should be authenticated using a two-factor
authentication mechanism (user name/ password and an additional authentication item such as a
token or certificate). In the case of vendor remote access accounts, in addition to the standard access
controls, vendor accounts should only be active while access is required to provide service. Access
rights should include only the access rights required for the service rendered, and should be robustly
audited.
In order to retain PABP compliance, certain remote administrative access criteria must be met:
■ EFD recommends remotely accessing the PAYMENTDIRECTOR/FRAUDSHIELD
Application server via a VPN (Virtual Private Network). In the event that a VPN is utilized to
access the PAYMENTDIRECTOR/FRAUDSHIELD application server, a unique, “per
client” encryption cePayment APPficate should be used, coupled with a strong password in
order to access the VPN. Only VPNs using IPSEC, PPTP or 128 bit (or greater) SSL
technologies may be used.
■ Any dial-in modem(s) which provide the capability of remote administrative support must be
turned off, or otherwise disabled, when not in use.
■ The “Payment APPsupport” UNIX user account should be disabled during times when not in
use.
■ “Two factor authentication” is required for any remote administrative access.
The following guidelines pertain to distributing cardholder data via “external” media such as paper
printouts (including reports, receipts and faxes), e-mails, or backup tapes.
In the event that any third party applications are added, or modifications made to the
PAYMENTDIRECTOR/FRAUDSHIELD application server, the additional application(s) must
not deny the integrity of PABP compliance. In keeping with PABP standards, the following rules
must also apply:
Once you have completed any system modifications, or software additions, EFD recommends you
perform a re-evaluation of PABP system compliance, as found in the Visa CISP “Payment
Applications Best Practices” document.